<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2026 to 2040.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/forbesindia-august-26-2013-india-internet-privacy-woes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-august-26-2013-venkatesh-upadhyay-election-campaign"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/forbesindia-august-22-2013-rohin-dharmakumar-dear-milind-deora-prakash-javadekar-deserved-the-truth"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-august-19-2013-prashant-jha-balancing-vigilance-and-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/forbesindia-august-13-2013-rohin-dharmakumar-how-nextgen-smartphone-users-are-being-bought-and-sold"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-august-9-2013-moulishree-srivastava-anirban-sen-chinese-hackers-baiting-indian-govt-corporate-employees"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-aug-1-2013-kim-arora-facebook-limiting-access-to-social-media-can-restrict-freedom-of-speech"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-august-4-2013-deepa-kurup-token-disclosures"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/ethical-issues-in-open-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/caravan-magazine-august-1-2013-rahul-m-crypto-night"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests">
    <title>Mixed signals? Supreme Court notices to states on Facebook arrests </title>
    <link>https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests</link>
    <description>
        &lt;b&gt;In wake of the recent arrests of UP-based scholar Kanwal Bharti and Andhra-based PUCL activist Jaya Vindhyala over their Facebook posts, NDTV aired a discussion on the grey areas of the IT Act. Pranesh Prakash, Shreya Singhal and Faizal Farooqui&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The video was&lt;a class="external-link" href="http://www.ndtv.com/video/player/the-social-network/mixed-signals-supreme-court-notices-to-states-on-facebook-arrests/287157?vod-related"&gt; published by NDTV on August 16, 2013&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The NDTV anchor asked Pranesh that this notice — the indicator coming from the government is that nobody seems to really know what section 66A is all about...and at the end of the day we are going to make a case by case decision.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh said that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This not just about 66A. This is actually about rule of law. We see that the arrest of Kanwal Bharti is actually a legal arrest. It goes against a judgment of the Allahabad High Court saying that routine arrests shouldn't be made in cases where the imprisonment term is less than 7 years. He actually hasn't been charged under 66A, he was charged under the IPC. It is not just about Internet censorship. It also very much about the rule of law and that completely breaking down in India and ... people's persectives and government's perspectives many times  are withering away when it comes offensive content or what they deem offensive or communal content being posted online...and if  something like what  Kanwal Bharti posted is actually deemed to be illegal under those provisions then lots of statements that the Prime Minister  of India has said should also be deemed to be equally illegal."&lt;/p&gt;
&lt;p&gt;Watch the full video below:&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/oeN5HCvTCF8" width="420"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests'&gt;https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-08-28T08:42:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/forbesindia-august-26-2013-india-internet-privacy-woes">
    <title>India's Internet Privacy Woes</title>
    <link>https://cis-india.org/news/forbesindia-august-26-2013-india-internet-privacy-woes</link>
    <description>
        &lt;b&gt;“For the sake of national security and to protect the privacy of its citizens, India should develop its own social media platforms,” says Dr Kamlesh Bajaj, CEO of Data Security Council of India (DSCI), a Nasscom-promoted ‘self-regulatory’ organisation on data protection and privacy in India, in a blog post dated August 13.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This article by Rohin Dharmakumar was &lt;a class="external-link" href="http://forbesindia.com/article/checkin/indias-internet-privacy-woes/35971/1"&gt;published in Forbes India&lt;/a&gt; on August 26, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Citing a litany of woes, including American control over internet  infrastructure, Bajaj makes the case for India to take a leaf out of  China’s playbook (“even though its reasons were different”) and  encourages the creation of “Indian” social media sites and search  engines.&lt;br /&gt;&lt;br /&gt;“Unfortunately, Dr Bajaj provides a wrong solution to a  correct diagnosis,” says Pranesh Prakash, a policy director with the  Centre for Internet and Society. “First, I can’t think of any  governmental intervention—short of a ban on existing foreign  services—that can make a new Indian service successful. Second, India’s  privacy laws are worse than those in the US. Nothing will stop the US  and Indian governments from coming after this company too.”&lt;br /&gt;&lt;br /&gt;The  problem arises because services like Facebook and Google store all your  data unencrypted on their servers, making it easy for them, or  governments and hackers, to monitor everything you do. The correct  solution, says Prakash, would be to encourage the creation and use of  de-centralised and end-to-end encrypted services that do not store all  your data in one place.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/forbesindia-august-26-2013-india-internet-privacy-woes'&gt;https://cis-india.org/news/forbesindia-august-26-2013-india-internet-privacy-woes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-05T11:09:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-august-26-2013-venkatesh-upadhyay-election-campaign">
    <title>Election campaign: parties draw battle lines on media platforms</title>
    <link>https://cis-india.org/news/livemint-august-26-2013-venkatesh-upadhyay-election-campaign</link>
    <description>
        &lt;b&gt;In the run-up to the 2014 polls, parties are drawing up media strategies that have a focus on young voters.&lt;/b&gt;
        &lt;p&gt;This article by Venkatesh Upadhyay was &lt;a class="external-link" href="http://www.livemint.com/Consumer/XU1EhHP3O5EYJRg3wQGD9M/Election-campaign-parties-draw-battle-lines-on-media-platfo.html"&gt;published in Livemint &lt;/a&gt;on August 26, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Major national political parties have begun to sharpen and tweak their  tools of public relations and media engagement in the run-up to the 2014  general election, with an eager nod towards a voters list that is  expected to be packed by the young.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;National parties currently in the process of shortlisting  their advertising, public relations and mobile marketing agencies  declined to share details.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The advertising strategy will crystalize by January. We will go for multiple agencies,” said &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Manish%20Tewari"&gt;Manish Tewari&lt;/a&gt;&lt;/span&gt;, spokesperson for the Congress as well as minister for information and broadcasting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to people familiar with the selection process, &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/JWT"&gt;JWT&lt;/a&gt;&lt;/span&gt;, &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Crayons%20Communications"&gt;Crayons Communications&lt;/a&gt;&lt;/span&gt; and &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Dentsu%20India"&gt;Dentsu India&lt;/a&gt;&lt;/span&gt;,  among others, are all in the race for the Congress business. Home-grown  Crayons has worked closely with the Delhi government and Congress in  the past.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Refusing to confirm the names on the shortlist, Tewari said it was a line-up of the “usual suspects”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For social media, the Congress has engaged Delhi-based &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/OMLogic"&gt;OMLogic&lt;/a&gt;&lt;/span&gt;, an online media marketing company, which helped create the website &lt;i&gt;fekuexpress.com&lt;/i&gt; that seeks to highlight the supposedly braggart nature of the opposition Bharatiya Janata Party’s chief campaigner &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Narendra%20Modi"&gt;Narendra Modi&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The website ran contests in which winners received film  tickets. OMLogic was among three shortlisted agencies from 22 that  competed for the same account, a person familiar with the bid said.  According to others aware of the developments, senior Congress leaders  such as &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Digvijay%20Singh"&gt;Digvijay Singh&lt;/a&gt;&lt;/span&gt; and &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Deepender%20Singh%20Hooda"&gt;Deepender Singh Hooda&lt;/a&gt;&lt;/span&gt; helped select the agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;OMLogic helps clients enhance their brands across  platforms and creates social media applications for them. The company  declined to comment for this story.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I believe these elections will represent the first time that political parties will have a conscious media strategy,” said &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Sanjaya%20Baru"&gt;Sanjaya Baru&lt;/a&gt;&lt;/span&gt;, communications advisor to Prime Minister &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Manmohan%20Singh"&gt;Manmohan Singh&lt;/a&gt;&lt;/span&gt; from 2004 to 2008.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/rigg4vKmrUs" width="420"&gt;&lt;/iframe&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;“By conscious I mean that political parties have  acknowledged the role of mass media in getting their message across to  voters. TV has taken the space of political rallies.”
&lt;div class="p"&gt;&lt;/div&gt;
&lt;div class="p"&gt;Baru said the media strategy for the coming elections was  essentially focused on TV and social media as “both these platforms  allow parties to reach out to large parts of the urban and semi-urban  demographic”.&lt;/div&gt;
&lt;div class="p"&gt;&lt;/div&gt;
&lt;div class="p"&gt;Close to 60 million new voters have been enrolled for the  2014 election, of whom 17.6 million are 18-19 year-old first-timers. A  study by the Iris Knowledge Foundation and Internet and Mobile  Association of India (IAMAI) estimates the number of urban social media  users to be around 78 million. The main users were in the age groups of  18-24 and 25-34 years.&lt;/div&gt;
&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;The Congress has already highlighted the role of social  media in its communication strategy. The party held a special session on  the use of social media by party members on 22 August that was  addressed by minister of state for human resources &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Shashi%20Tharoor"&gt;Shashi Tharoor&lt;/a&gt;&lt;/span&gt;, and &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Manish%20Tewari"&gt;Manish Tewari&lt;/a&gt;&lt;/span&gt;.  In a similar meeting last month, party members were briefed on how to  comment on key issues, including the state of the economy, and  personalities like Modi, who is also Gujarat chief minister.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;It also launched an intranet software called Khidki  (Hindi for window) for use by Congress members. According to party  politicians, another important part of last month’s exercise was to  identify young members who would make up a cadre of spokespersons that  would then participate across news channels.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;The BJP, meanwhile, has drafted Internet entrepreneurs &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/B.G.%20Mahesh"&gt;B.G. Mahesh&lt;/a&gt;&lt;/span&gt; and &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Rajesh%20Jain"&gt;Rajesh Jain&lt;/a&gt;&lt;/span&gt; to help the party with its social media operations. Acknowledging the  role of social media in the party’s media strategy, BJP spokesperson &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Nirmala%20Seetharaman"&gt;Nirmala Seetharaman&lt;/a&gt;&lt;/span&gt; said, “Our exercise has already taken on board the position which the  party enjoys on various social media. We only emphasized the content  that such media ought to have,” she added.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Prominent members of the party, led by Modi, have large followings on social media. Modi’s &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Twitter"&gt;Twitter&lt;/a&gt;&lt;/span&gt; account is followed by close to 2.1 million people.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Last week, the BJP launched &lt;i&gt;india272.com&lt;/i&gt; that  would “crowd source” suggestions by the electorate. It also launched a  website where its members can upload “chargesheets” on the Congress-led  United Progressive Alliance. Visitors to &lt;i&gt;www.bjp.org/upachargesheet&lt;/i&gt; can also make use of different social media platforms such as &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Facebook"&gt;Facebook&lt;/a&gt;&lt;/span&gt;, &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Twitter"&gt;Twitter&lt;/a&gt;&lt;/span&gt;, &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/YouTube"&gt;YouTube&lt;/a&gt;&lt;/span&gt; and &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Flickr"&gt;Flickr&lt;/a&gt;&lt;/span&gt; to register their complaints.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Some Internet activists are sceptical about such  strategies. “The average Indian netizen is not that well equipped to  critically analyse the content coming from so-called crowdsourced  mechanisms,” said &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;&lt;/span&gt;,  executive director of the Centre for Internet and Society, a  Bangalore-based Internet policy research organization. “I believe that  social media might be one step removed from actual voters and might be  more oriented towards opinion makers. In that sense social media (in  India) behaves very differently from the way it has been used in the  US.”&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;According to an online media expert familiar with the  BJP’s social media campaign, the interactive nature of social media  helps build up an image of transparency while making the party more  accessible to a young audience that has been switching off television  news.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;In addition, social media allows political leaders to gauge public response quickly.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;&lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Ajay%20Maken"&gt;Ajay Maken&lt;/a&gt;&lt;/span&gt;,  Congress general secretary and the man who heads the party’s  communication strategy, pointed out in an article published this month  that subjects that become influential on Twitter during the day tend to  turn into full-fledged TV debates by the evening.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;But political parties are not giving up on television channels just yet.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;According to a report by consulting firm KPMG, the number  of Indian households with TV sets is estimated to be 154 million, and  is expected to grow to 173 million by 2017. TAM Media research estimated  the number of TV households to be 123 million in 2009. Meanwhile,  cable- and satellite-owning TV households has in the period 2009-2012  ballooned from 90 million to 126 million, according to TAM.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;The Congress has issued guidelines to its members on how  to behave on television. According to individuals familiar with the  move, the party has also set up a research cell that informs Congress  spokespersons about subjects that they are asked to speak on.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Congress members who participate in televised debates  have been given strict orders to not go on air without a thorough  understanding of the nuances of issues—provided to them by Congress  researchers. For instance, spokespersons have been advised to rely on  facts and be data-specific when confronted with the twin issues of  Gujarat’s high-growth economy and Modi’s governance record.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;In order to streamline the process, the party has come up  with lists of speakers who are focused on specific issues. It has also  constituted media cells in each state capitals with three  units—spokespersons, social media cell and research —and a social media  division for every urban centre with a population of at least a million.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;The BJP has devised a similar strategy. Party  spokespersons have been asked to mention chief ministers other than Modi  if asked about the leadership for the 2014 elections. &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Arun%20Jaitley"&gt;Arun Jaitley&lt;/a&gt;&lt;/span&gt;, in a interview to&lt;i&gt; The Hindu&lt;/i&gt;, on 19 August had spoken about the possibility of there being close to 10 prime ministerial candidates in the BJP.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;The BJP, which held a closed-door media workshop for  party members last week, is also keen on research. “A lot of policy  requires specialized understanding which is largely domain-specific. In  that regard, members of our party will need to be prepared when they  speak on such issues,” said spokesperson Seetharaman.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;The Congress has already begun a television  ads-blitzkrieg to trumpet its record in government. Begun in May, these  ads have sought to showcase the fruits of the welfare state, including  schemes aimed at the poor, such as theMahatma Gandhi National Rural  Employment Guarantee Act, as well a long list of rights-based laws. One  well-known ad tells the story of a fictional young woman named Priya who  lives in a village but makes use of opportunities in education and  improved electricity connections to become a successful entrepreneur.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-august-26-2013-venkatesh-upadhyay-election-campaign'&gt;https://cis-india.org/news/livemint-august-26-2013-venkatesh-upadhyay-election-campaign&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-05T10:23:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom">
    <title>Out of the Bedroom</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom</link>
    <description>
        &lt;b&gt;We have shared it with our friends. We have watched it with our lovers. We have discussed it with our children and talked about it with our partners. It is in our bedrooms, hidden in sock drawers. It is in our laptops, in a folder marked "Miscellaneous". It is in our cellphones and tablets, protected under passwords. It is the biggest reason why people have learned to clean their browsing history and cookies from their browsers. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The &lt;a class="external-link" href="http://www.indianexpress.com/news/out-of-the-bedroom/1159657/0"&gt;article by Nishant Shah was published in the Indian Express&lt;/a&gt; on August 25, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Whether we go into surreptitious shops to buy unmarked CDs or trawl through Torrent and user-generated content sites in the quest of a video, there is no denying the fact that it has become a part of our multimedia life. Even in countries like India, where consumption and distribution of pornography are punished by law, we know that pornography is rampant. With the rise of the digital technologies of easy copy and sharing, and the internet which facilitates amateur production and anonymous distribution, pornography has escaped the industrial market and become one of the most intimate and commonplace practices of the online world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In fact, if Google trend results are to be believed, Indians are among the top 10 nationalities searching for pornography daily. Even a quick look at our internet history tells us that it has all been about porn. The morphed pictures of a naked Pooja Bhatt adorned the covers of Stardust in the late 1990s, warning us that the true potential of Photoshop had been realised. The extraordinary sensation of the Delhi Public School MMS case which captured two underage youngsters in a grainy sexcapade announced the arrival of user-generated porn in a big way. The demise of Savita Bhabhi — India's first pornographic graphic novel — is still recent enough for us to remember that the history of the internet in India is book-ended by porn and censorship.&lt;br /&gt;&lt;br /&gt;Recent discussions on pornography have been catalysed by a public interest litigation requesting for a ban on internet pornography filed in April by Kamlesh Vaswani. Whether Vaswani's observations on what porn can make us do stem from his own personal epiphany or his self-appointed role as our moral compass is a discussion that merits its own special space. Similarly, a debate on the role, function, and use of pornography in a society is complex, rich and not for today.&lt;br /&gt;&lt;br /&gt;Instead, I want to focus on the pre-Web imagination of porn that Vaswani and his endorsers are trying to impose upon the rest of us. There is a common misunderstanding that all porn is the same porn, no matter what the format, medium and aesthetics of representations. Or in other words, a homogenising presumption is that erotic fiction and fantasies, pictures of naked people in a magazine, adult films produced by entertainment houses, and user-generated videos on the internet are the same kind of porn. However, as historical legal debates and public discussions have shown us, what constitutes porn is specific to the technologies that produce it. There was a time when DH Lawrence's iconic novel now taught in undergraduate university courses — Lady Chatterley's Lover — was deemed pornographic and banned in India. In more recent times, the nation was in uproar at the Choli ke peeche song from Khalnayak which eventually won awards for its lyrics and choreography.&lt;br /&gt;&lt;br /&gt;In all the controversy, there has so far been a "broadcast imagination" of how pornography gets produced, consumed and distributed. There is a very distinct separation of us versus them when it comes to pornography. They produce porn. They distribute porn. They push porn down our throats (that was probably a poor choice of words) by spamming us and buying Google adwords to infect our search results. We consume porn. And all we need to do is go and regulate, like we do with Bollywood, the central management and distribution mechanism so that the flow of pornography can be curbed. This is what I call a broadcast way of thinking, where the roles of the performers, producers, consumers and distributors of pornography are all distinct and can be regulated.&lt;br /&gt;&lt;br /&gt;However, within the murky spaces of the World Wide Web, the scenario is quite different. Internet pornography is not the same as availability of pornography on the internet. True, the digital multimedia space of sharing and peer-2-peer distribution has made the internet the largest gateway to accessing pornographic objects which are produced through commercial production houses. However, the internet is not merely a way of getting access to existing older forms of porn. The internet also produces pornography that is new, strange, unprecedented and is an essential part of the everyday experience of being digitally connected and networked into sociality.&lt;br /&gt;&lt;br /&gt;The recent controversies about the former congressman from New York, Anthony Weiner, sexting — sending inappropriate sexual messages through his cellphone — gives us some idea of what internet porn looks like. It is not just something captured on a phone-cam but interactive and collaboratively produced. Or as our own Porngate, where two cabinet ministers of the Karnataka legislative assembly were caught surfing some good old porn on their mobile devices while the legislature was in session, indicated, porn is not something confined to the privacy of our rooms. Naked flashmobs, young people experimenting with sexual identities in public, and sometimes bizarre videos of a bus-ride where the camera merely captures the banal and the everyday through a "pornographic gaze" are also a part of the digital porn landscape. The world of virtual reality and multiple online role-playing games offer simulated sexual experiences that allow for human, humanoid, and non-human avatars to engage in sexual activities in digital spaces. Peer-2-peer video chat platforms like Chatroulette, offer random encounters of the naked kind, where nothing is recorded but almost everything can be seen.&lt;br /&gt;&lt;br /&gt;The list of pornography produced by the internet — as opposed to pornography made accessible through the internet — is huge. It doesn't just hide in subcultural practices but resides on popular video-sharing sites like YouTube or Tumblr blogs. It vibrates in our cellphones as we connect to people far away from us, and pulsates on the glowing screens of our tablets as we get glimpses of random strangers and their intimate bodies and moments. An attempt to ban and censor this porn is going to be futile because it does not necessarily take the shape of a full narrative text which can be examined by others to judge its moral content. Any petition that tries to censor such activities is going to fall flat on its face because it fails to recognise that sexual expression, engagement and experimentation is a part of being human — and the ubiquitous presence of digital technologies in our life is going to make the internet a fair playground for activities which might seem pornographic in nature. In fact, trying to restrict and censor them, will only make our task of identifying harmful pornography — porn that involves minors, or hate speech or extreme acts of violence — so much more difficult because it will be pushed into the underbelly of the internet which is much larger than the searched and indexed World Wide Web.&lt;br /&gt;&lt;br /&gt;Trying to suggest that internet pornography is an appendage which can be surgically removed from everyday cyberspace is to not understand the integral part that pornography and sexual interactions play in the development and the unfolding of the internet. The more fruitful efforts would be to try and perhaps create a guideline that helps promote healthy sexual interaction and alerts us to undesirable sexual expressions which reinforce misogyny, violence, hate speech and non-consensual invasions of bodies and privacy. This blanket ban on trying to sweep all internet porn under a carpet is not going to work — it will just show up as a big bump, in places we had not foreseen.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom'&gt;https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-09-06T08:32:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/forbesindia-august-22-2013-rohin-dharmakumar-dear-milind-deora-prakash-javadekar-deserved-the-truth">
    <title>Dear Milind Deora, Prakash Javadekar Deserved The Truth</title>
    <link>https://cis-india.org/news/forbesindia-august-22-2013-rohin-dharmakumar-dear-milind-deora-prakash-javadekar-deserved-the-truth</link>
    <description>
        &lt;b&gt;Milind Deora, the Minister of State for Communications, Information Technology and Shipping, isn’t your typical politician.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Rohin Dharmakumar was &lt;a class="external-link" href="http://forbesindia.com/blog/technology/dear-milind-deora-prakash-javadkar-deserved-the-truth/"&gt;published in Forbesindia Magazine &lt;/a&gt;on August 22, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;At just 36, he’s way younger than the average cabinet minister (&lt;a href="http://articles.timesofindia.indiatimes.com/2010-08-29/india/28316521_1_average-age-median-age-prime-minister"&gt;64&lt;/a&gt;) or Member of Parliament (&lt;a href="http://articles.timesofindia.indiatimes.com/2009-05-18/india/28196750_1_congress-mp-average-age-15th-lok-sabha"&gt;53&lt;/a&gt;). He’s also richer (&lt;a href="http://myneta.info/unionministers2011/candidate.php?candidate_id=76"&gt;Rs.17.5 crore&lt;/a&gt; compared to &lt;a href="http://www.firstpost.com/politics/parliament-at-60-how-rich-are-our-netas-311074.html"&gt;Rs.5.3 crore&lt;/a&gt; for the average M.P.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He’s got his own website - &lt;a href="http://www.milinddeora.in/"&gt;www.milinddeora.in&lt;/a&gt; -  which unlike most of his peer’s websites, is fairly well-designed and  constantly updated. He’s also an avid user of social networks like  Twitter (&lt;a href="https://twitter.com/milinddeora"&gt;@milinddeora&lt;/a&gt;) and &lt;a href="https://www.facebook.com/milind.deora.14"&gt;Facebook&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Oh, he’s also a Blues fan and a &lt;a href="http://blogs.wsj.com/indiarealtime/2011/05/11/mp-milind-deora-shreds-on-blues-guitar/"&gt;pretty good&lt;/a&gt; guitarist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In short, he’s the kind of politician or minister many Indians would like to vote for.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And vote they do, in fact. Deora’s won the Mumbai (South) parliamentary constituency two times in a row, garnering &lt;a href="http://www.indian-elections.com/maharashtra/mumbai-south.html"&gt;nearly twice&lt;/a&gt; his next opponent’s votes during the 2009 elections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Which is why it’s surprising, and saddening, to see Deora trot out a  patently false set of answers to how America’s global dragnet of  Internet surveillance is affecting the privacy of Indians.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On 16th August Deora responded to &lt;a href="http://rajyasabha.nic.in/"&gt;a question from Rajya Sabha M.P.&lt;/a&gt; and BJP Spokesperson Prakash Javadekar, asking the following:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;(a) whether it is a fact that India was the fifth  most tracked country by the United States intelligence, particularly on  the internet;&lt;/i&gt;&lt;br /&gt; &lt;i&gt; (b) if so, the details thereof;&lt;/i&gt;&lt;br /&gt; &lt;i&gt; (c) the impact of USA”s surveillance program-Prism and Boundless Information on the country; and&lt;/i&gt;&lt;br /&gt; &lt;i&gt; (d) the steps Government intends to take to protect country”s interests and the privacy of its citizens?&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Javadekar’s question was sorely needed in light of the near-daily  disclosures being made about the scarily omnipresent extent to which the  US Government spies on global Internet users through a myriad of ways.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India, as Javadekar rightly pointed out, was indeed the &lt;a href="http://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;fifth most monitored country&lt;/a&gt; under the “Boundless Informant” data mining tool that tracks the NSA’s  (the US’ lead communications spy agency) global surveillance efforts. In  just March 2013 alone, according to a leaked presentation on the tool,  the NSA collected 6.3 billion pieces of information from India. Suffice  it to say, the information would have come from Indian citizens,  businesses, ministries, bureaucrats and of course, members of Parliament  (most of who now use webmail and social network from the likes of  Google and Facebook).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The only countries that were spied upon more than us were Iran, Pakistan, Jordan and Egypt. Some sobering company, that!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One would thus expect Deora to be seized of the urgency and concern behind Javadekar’s questions. His answer was:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;(a) &amp;amp; (b) In June 2013, Media reports have  disclosed that India is the fifth largest target of United States  electronic surveillance programmes, in terms of interception of  communications on fibre cables and other infrastructure. As per media  reports, United States agencies used a number of methods to gather  intelligence including intercepting communication on fibre cables and  infrastructure, collecting information from servers of global internet  and Telecom Service Providers. Such companies include Google, Facebook,  Microsoft, Apple, Yahoo, AOL,Youtube, Paltalk and Skype.&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Here we have a member of Parliament asks India’s Minister for  Communications &amp;amp; IT about the extent to which Indian citizens and  businesses are being spied upon by the US – ostensibly a friendly  country – and all the Minister could do was cite newspaper reports?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What about your own investigations Mr.Minister? What is the opinion  of your leading spy agencies like the NTRO, R&amp;amp;AW and IB? Are they  also relying on newspaper reports?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But wait, Deora does go on to provide a few more answers:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;(c) &amp;amp; (d) Government has expressed concerns over  reported United States monitoring of internet traffic from India.  Concerns with regard to violation of any Indian laws relating to privacy  of information of ordinary Indian citizen as well as intrusive data  capture deployed against Indian citizens or government infrastructure  have been conveyed to the United States. The issue of United States  Cyber surveillance activities was discussed during the Indo-US (India  United States ) strategic dialogue meeting held in New Delhi on  24.06.2013.&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Whew. That was reassuring. We expressed “concerns with regard to  violation of any Indian laws relating to privacy of information” to the  US during a “strategic dialogue meeting”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Let me guess what the US side responded: “Sure. We’ll do that. Come back to us when you have a privacy law. Ha ha!”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As Sunil Abraham, the director for the Center for Internet &amp;amp; Society points out in Forbes India, India has &lt;a href="http://forbesindia.com/article/recliner/freedom-from-monitoring-india-inc-should-push-for-privacy-laws/35911/1"&gt;no modern and comprehensive privacy law&lt;/a&gt;. And the government is working on a new one for only &lt;b&gt;the last three years&lt;/b&gt;:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;What would an ideal privacy law for India look like?  For one, it would protect the rights of all persons, regardless of  whether they are citizens or residents. Two, it would define privacy  principles. Three, it would establish the office of an independent and  autonomous privacy commissioner, who would be sufficiently empowered to  investigate and take action against both government and private  entities. Four, it would define civil and criminal offences, remedies  and penalties. And five, it would have an overriding effect on previous  legislation that does not comply with all the privacy principles.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;The Justice AP Shah Committee report, released in October 2012,  defined the Indian privacy principles as notice, choice and consent,  collection limitation, purpose limitation, access and correction,  disclosure of information, security, openness and accountability. The  report also lists the exemptions and limitations, so that privacy  protections do not have a chilling effect on the freedom of expression  and transparency enabled by the Right to Information Act.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;The Department of Personnel and Training has been working on a  privacy bill for the last three years. Two versions of the bill had  leaked before the Justice AP Shah Committee was formed. The next version  of the bill, hopefully implementing the recommendations of the Justice  AP Shah Committee report, is expected in the near future. In a  multi-stakeholder-based parallel process, the Centre for Internet and  Society (where I work), along with FICCI and DSCI, is holding seven  round tables on a civil society draft of the privacy bill and the  industry-led efforts on co-regulation.&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div style="text-align: justify; "&gt;Which brings me to the final part of Deora’s response to Javadekar:&lt;/div&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;United States official responded that PRISM dealt  only with Meta Data (related to the direction and the flow of the  traffic) and only broad patterns of telephony and internet traffic are  monitored. United States Officials maintained that data content/content  of emails are not accessed or not monitored under these surveillance  programmes; therefore, it is not a violation of privacy. It was stated  by United States that its agencies need to get separate authorization  from Foreign Intelligence Surveillance Act (FISA) court, if they want to  access the content of any of the data intercepted by these surveillance  programmes.&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Dear Mr.Minister, either you have been lied to by your friendly “United States Official”, or, well…&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Firstly, by limiting the answer to only PRISM, which happens to be  just one of the NSA’s secret tools for online surveillance, you are  willfully or inadvertently narrowing down Javadekar’s question which  specifically mentions other tools like Boundless Informant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Almost all of the big Internet companies revealed to be part of the NSA’s global spying mechanism have also &lt;a href="http://www.theatlanticwire.com/technology/2013/06/prism-companies-start-denying-knowledge-nsa-program-collecting-their-users-data/65996/"&gt;used the same tactic to tailor their denials&lt;/a&gt;.  I suppose they got the cue from the NSA, which loves using the “Under  This Program” dodge to derail specific questions about its secret  programs, &lt;a href="https://www.eff.org/deeplinks/2013/08/guide-deceptions-word-games-obfuscations-officials-use-mislead-public-about-nsa"&gt;according to the Electronic Frontier Foundation&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;Another tried and true technique in the NSA  obfuscation playbook is to deny it does one invasive thing or another  “under this program.” When it’s later revealed the NSA actually does do  the spying it said it didn’t, officials can claim it was just part of  another program not referred to in the initial answer.&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;In case you weren’t aware of the NSA’s obfuscation tactics Mr.Minister, here is another great piece on it from the Slate – &lt;a href="http://www.slate.com/articles/news_and_politics/politics/2013/07/nsa_lexicon_how_james_clapper_and_other_u_s_officials_mislead_the_american.html"&gt;“How to Decode the True Meaning of What NSA Officials Say”&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus when your friendly US official tells you that “only meta data  (related to the direction and the flow of the traffic) and only broad  patterns of telephony and internet traffic are monitored” under PRISM,  not “data content/content of emails”, he or she is technically right.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Because the NSA has other programs that capture all of that. For  instance, XKeyscore, which according to leaked presentations, it can  capture &lt;a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data"&gt;“nearly everything a typical user does on the internet”&lt;/a&gt;. This includes emails, visits to websites, web searches and Facebook chats &amp;amp; private messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Did you also know, Mr. Minister, that the XKeyscore surveillance program has &lt;a href="http://www.thehindu.com/news/international/world/nsas-xkeyscore-surveillance-program-has-servers-in-india/article4978248.ece"&gt;servers located inside India&lt;/a&gt;?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, you make a statement that is patently false. You say that US  spy agencies need authorizations from the secret Foreign Intelligence  Surveillance Courts (FISC) in order to access the data collected by  various surveillance programs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FISA courts almost always approve &lt;i&gt;any request&lt;/i&gt; made to them (they apparently &lt;a href="http://www.motherjones.com/mojo/2013/06/fisa-court-nsa-spying-opinion-reject-request"&gt;rejected just 11 requests out of 33,900&lt;/a&gt; made by the US government in the last 33 years), so that’s that for oversight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And in the NSA’s Orwellian world of doublespeak, large scale interception and storage of Internet communications &lt;a href="https://www.eff.org/nsa-spying/wordgames#collect"&gt;isn’t considered “collected”&lt;/a&gt; till such time one of their agents has had a chance to look at it.  Which means if you’re reading this post – the NSA’s secret servers over  the world and in India can coolly capture that and store it in vast  databases for posterity – without it ever registering as a “collection”  or requiring any approval from FISA courts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fact is, Mr.Minister, we “foreigners” (unless you belong to one of the four other countries that are part of the &lt;a href="http://www.theatlantic.com/politics/archive/2013/06/is-the-five-eyes-alliance-conspiring-to-spy-on-you/277190/"&gt;“Five Eyes” alliance&lt;/a&gt;, in which case you’ll be treated with a wee bit more caution) , that is, us, &lt;a href="http://www.theguardian.com/world/2013/aug/09/nsa-loophole-warrantless-searches-email-calls"&gt;are fair game&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;The intelligence data is being gathered under Section  702 of the of the Fisa Amendments Act (FAA), which gives the NSA  authority to target without warrant the communications of foreign  targets, who must be non-US citizens and outside the US at the point of  collection.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;The communications of Americans in direct contact with foreign  targets can also be collected without a warrant, and the intelligence  agencies acknowledge that purely domestic communications can also be  inadvertently swept into its databases. That process is known as  “incidental collection” in surveillance parlance.&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;We expected better answers from you Mr.Minister – sorry, &lt;i&gt;expect&lt;/i&gt; better.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Alas your recent answers don’t inspire much trust, for instance when you tell us constant surveillance is &lt;a href="http://www.medianama.com/2013/06/223-prism-milind-deora-cms-central-monitoring-system/"&gt;“good for us”&lt;/a&gt; and &lt;a href="http://www.livemint.com/Politics/rpWFiDJroLgpLQ6yKdR3pJ/Telcos-to-soon-link-with-government-monitoring-system.html"&gt;“will enhance the privacy of citizens”&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Or when you tell us that “Google Hangouts” – a service provided by &lt;a href="http://forbesindia.com/article/real-issue/is-google-gobbling-up-the-indian-internet-space/35641/0"&gt;a company that looms over nearly everything Indians do online&lt;/a&gt; – is &lt;a href="http://businesstoday.intoday.in/story/elections-2014-google-hangouts-is-proving-especially-popular/1/197250.html"&gt;a better medium to reach out to people than Parliament or Television&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We deserve the truth from you Mr.Minister. Just like Prakash Javadekar.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/forbesindia-august-22-2013-rohin-dharmakumar-dear-milind-deora-prakash-javadekar-deserved-the-truth'&gt;https://cis-india.org/news/forbesindia-august-22-2013-rohin-dharmakumar-dear-milind-deora-prakash-javadekar-deserved-the-truth&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-05T10:38:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring">
    <title>Freedom from Monitoring: India Inc Should Push For Privacy Laws</title>
    <link>https://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring</link>
    <description>
        &lt;b&gt;More surveillance than absolutely necessary actually undermines the security objective.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This article by Sunil Abraham was &lt;a class="external-link" href="http://forbesindia.com/article/recliner/freedom-from-monitoring-india-inc-should-push-for-privacy-laws/35911/1"&gt;published in Forbes India Magazine&lt;/a&gt; on August 21, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;I think I understand why the average Indian IT entrepreneur or enterprise does not have a position on blanket surveillance. This is because the average Indian IT enterprise’s business model depends on labour arbitrage, not intellectual property. And therefore they have no worries about proprietary code or unfiled patent applications being stolen by competitors via rogue government officials within projects such as NATGRID, UID and, now, the CMS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A sub-section of industry, especially the technology industry, will always root for blanket surveillance measures. The surveillance industry has many different players, ranging from those selling biometric and CCTV hardware to those providing solutions for big data analytics and legal interception systems. There are also more controversial players who provide spyware, especially those in the market for zero-day exploits. The cheerleaders for the surveillance industry are techno-determinists who believe you can solve any problem by throwing enough of the latest and most expensive technology at it.&lt;br /&gt;&lt;br /&gt;What is surprising, though, is that other indigenous or foreign enterprises that depend on secrecy and confidentiality—in sectors such a banking, finance, health, law, ecommerce, media, consulting and communications—also don’t seem to have a public position on the growing surveillance ambitions of ‘democracies’ such as India and the United States of America. (Perhaps the only exceptions are a few multinational internet and software companies that have made some show of resistance and disagreement with the blanket surveillance paradigm.)&lt;br /&gt;&lt;br /&gt;Is it because these businesses are patriotic? Do they believe that secrecy, confidentiality and, most importantly, privacy, must be sacrificed for national security? If that were true then it would not be a particularly wise thing to do, as privacy is the precondition for security. Ann Cavoukian, privacy commissioner of Ontario, calls it a false dichotomy. Bruce Schneier, security technologist and writer, calls it a false zero sum game; he goes on to say, “There is no security without privacy. And liberty requires both security and privacy.”&lt;br /&gt;&lt;br /&gt;The reason why the secret recipe of Coca Cola is still secret after over 120 years is the same as the reason why a captured soldier cannot spill the beans on the overall war strategy. Corporations, like militaries, have layers and layers of privacy and secrecy. The ‘need to know’ principle resists all centralising tendencies, such as blanket surveillance. It’s important to note that targeted surveillance to identify a traitor or spy within the military, or someone engaged in espionage within a corporation, is pretty much an essential. However, any more surveillance than absolutely necessary actually undermines the security objective. To summarise, privacy is a pre-condition to the security of the individual, the enterprise, the military and the nation state.&lt;br /&gt;&lt;br /&gt;Most people complaining online about projects like the Central Monitoring System seem to think that India has no privacy laws. This is completely untrue: We have around 50 different laws, rules and regulations that aim to uphold privacy and confidentiality in various domains. Unfortunately, most of those policies are very dated and do not sufficiently take into account the challenges of contemporary information societies. These policy documents need to be updated and harmonised through the enactment of a new horizontal privacy law. A small minority will say that Section 43(A) of the Information Technology Act is the India privacy law. That is not completely untrue, but is a gross exaggeration. Section 43(A) is really only a data security provision and, at that, it does not even comprehensively address data protection, which is only a sub-set of the overall privacy regulation required in a nation. &lt;br /&gt;&lt;br /&gt;What would an ideal privacy law for India look like? For one, it would protect the rights of all persons, regardless of whether they are citizens or residents. Two, it would define privacy principles. Three, it would establish the office of an independent and autonomous privacy commissioner, who would be sufficiently empowered to investigate and take action against both government and private entities. Four, it would define civil and criminal offences, remedies and penalties. And five, it would have an overriding effect on previous legislation that does not comply with all the privacy principles. &lt;br /&gt;&lt;br /&gt;The Justice AP Shah Committee report, released in October 2012, defined the Indian privacy principles as notice, choice and consent, collection limitation, purpose limitation, access and correction, disclosure of information, security, openness and accountability. The report also lists the exemptions and limitations, so that privacy protections do not have a chilling effect on the freedom of expression and transparency enabled by the Right to Information Act.&lt;br /&gt;&lt;br /&gt;The Department of Personnel and Training has been working on a privacy bill for the last three years. Two versions of the bill had leaked before the Justice AP Shah Committee was formed. The next version of the bill, hopefully implementing the recommendations of the Justice AP Shah Committee report, is expected in the near future. In a multi-stakeholder-based parallel process, the Centre for Internet and Society (where I work), along with FICCI and DSCI, is holding seven round tables on a civil society draft of the privacy bill and the industry-led efforts on co-regulation.&lt;br /&gt; &lt;br /&gt;The Indian ITES, KPO and BPO sector should be particularly pleased with this development. As should any other Indian enterprise that holds personal information of EU and US nationals. This is because the EU, after the enactment of the law, will consider data protection in India adequate as per the requirements of its Data Protection Directive. This would mean that these enterprises would not have to spend twice the time and resources ensuring compliance with two different regulatory regimes.&lt;br /&gt;&lt;br /&gt;Is the lack of enthusiasm for privacy in the Indian private sector symptomatic of Indian societal values? Can we blame it on cultural relativism, best exemplified by what Simon Davies calls “the Indian Train Syndrome, in which total strangers will disclose their lives on a train to complete strangers”? But surely, when email addresses are exchanged at the end of that conversation, they are not accompanied by passwords. Privacy is perhaps differently configured in Indian societies but it is definitely not dead. Fortunately for us, calls to protect this important human right are growing every day.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring'&gt;https://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Central Monitoring System</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-21T07:04:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-august-19-2013-prashant-jha-balancing-vigilance-and-privacy">
    <title>Balancing vigilance and privacy</title>
    <link>https://cis-india.org/news/the-hindu-august-19-2013-prashant-jha-balancing-vigilance-and-privacy</link>
    <description>
        &lt;b&gt;As the government steps up its surveillance capabilities, the entire social contract between the state and citizens is being reformulated, with worrying consequences.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;This article by Prashant Jha was &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/technology/balancing-vigilance-and-privacy/article5037582.ece"&gt;published in the Hindu on August 18, 2013&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Indian state is arming itself with both technological capabilities  and the institutional framework to track the lives of citizens in an  unprecedented manner.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A new Centralised Monitoring System (CMS) is in the offing, which would build on the already existing mechanisms. As &lt;i&gt;The Hindu &lt;/i&gt;reported  on June 21, this would allow the government to access in real-time any  mobile and fixed line conversation, SMS, fax, website visit, social  media usage, Internet search and email, and will have ‘unmatched  capabilities of deep search surveillance and monitoring’.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Civil society groups and citizens expressed concern about the  government’s actions, plans, and intent at a discussion organised by the  Foundation for Media Professionals, on Saturday.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The context&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Usha Ramanathan, a widely respected legal scholar, pointed to the larger  political context which had permitted this form of surveillance. It  stemmed, she argued, from a misunderstanding of the notion of  sovereignty. “It is not the government, but the people who are  sovereign.” Laws and the Constitution are about limiting the power of  the state, but while people were being subjected to these restrictions,  the government itself had found ways to remain above it – either by not  having laws, or having ineffective regulators. States knew the kind of  power they exercised over citizens, with the result that ‘impunity had  grown’.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“There is also a complete breakdown of the criminal justice system,” Ms  Ramanathan said. This had resulted in a reliance on extra-judicial  methods of investigation, and ‘scape-goating’ had become the norm.  ‘National security’ had been emphasised, re-emphasised, and projected as  the central goal. “We haven’t paused to ask what this means, and the  extent to which we have been asked to give up personal security for the  sake of national security.” It was in this backdrop that technology had  advanced by leaps, and made extensive surveillance possible.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The implications are enormous. The data is often used for purposes it is  not meant for, including political vendetta, keeping track of rivals,  corporates, and digging out facts about a citizen when he may have  antagonised those in power.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Pranesh Prakash, director of the Centre of Internet and Society (CIS)  looked back at the killing of Haren Pandya, the senior Bharatiya Janata  Party (BJP) leader in Gujarat. Mr Pandya was using the SIM card of a  friend, and it was by tracking the SIM, and through it his location,  that the Gujarat government got to know that Mr Pandya had deposed  before a commission and indicted the administration for its role in the  riots. Eventually, he was found murdered outside a park in Ahmedabad.  The Gujarat Police had accessed call details of 90,000 phones.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It is also not clear whether mining this kind of data has been effective  for the national security purposes, which provide the reason for doing  it in the first place. Saikat Datta, resident editor of Daily News and  Analysis, and an expert on India’s intelligence apparatus, said a core  problem was the absence of any auditing and over sight. “There needs to  be a constant review of the number of calls, emails under surveillance,  with questions about whether it is yielding results. But this does not  happen, probably because a majority is not for counter-terrorism. There  would be trouble if you build accountability mechanisms.” When he sought  information under RTI around precisely such issues, he was denied  information on the grounds that it would strengthen ‘enemies of the  state’.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Anja Kovacs, who works with the Internet Democracy Project, said this  form of “mass surveillance” criminalised everybody since it was based on  the assumption that each citizen was a “potential criminal”. She also  pointed out that having “more information” did not necessarily mean it  was easier to address security threats – there was intelligence  preceding the Mumbai attacks, but it was not acted upon. She added,  “Most incidents have been resolved by traditional intelligence.  Investing in agencies, training them better could be more effective.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Bring in the caveats&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Few argue that the state is not entitled to exercise surveillance at  all. In fact, a social contract underpins democratic states. Citizens  agree to subject some of their rights to restrictions, and vest the  state with the monopoly over instruments and use of violence. In turn,  the state – acting within a set of legal principles; being accountable  to citizens; and renewing its popular legitimacy through different  measures, including elections – provides order and performs a range of  developmental functions.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;This framework, citizens and civil liberty groups worry, is under threat  with governments appropriating and usurping authority to conduct  unprecedented surveillance. Citizen groups, technology and privacy  experts came together globally to draft the International Principles on  the Application of Human Rights to Communication Surveillance.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It prescribed that any restriction to privacy through surveillance must  be ‘legal’; it must be for a ‘legitimate aim’; it must be ‘strictly and  demonstrably necessary’; it must be preceded by showing to an  established authority that other ‘less invasive investigative  techniques’ have been used; it must follow ‘due process’; decisions must  be taken by a ‘competent judicial authority’; there must be ‘public  oversight’ mechanisms; and ‘integrity of communications and systems’  should be maintained. (Full text available on  www.necessaryandproportionate.org)Mr Prakash of CIS, which has done  extensive work on surveillance and privacy issues, said, “An additional  principle must be collection limitation or data minimisation.” Giving  the instance of Indian Railways seeking the date of birth from a  customer booking a ticket, Mr Prakash said this was not information  which was necessary. But it could be used by hackers and many other  agencies to access an individual’s private transactions in other areas.  The UPA government is finalising a privacy Bill, but its final version  is not yet public, and it is not clear how far the government would go  in protecting citizen rights.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-august-19-2013-prashant-jha-balancing-vigilance-and-privacy'&gt;https://cis-india.org/news/the-hindu-august-19-2013-prashant-jha-balancing-vigilance-and-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Central Monitoring System</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-05T10:53:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/forbesindia-august-13-2013-rohin-dharmakumar-how-nextgen-smartphone-users-are-being-bought-and-sold">
    <title>How Next-Gen Smartphone Users are Being Bought and Sold</title>
    <link>https://cis-india.org/news/forbesindia-august-13-2013-rohin-dharmakumar-how-nextgen-smartphone-users-are-being-bought-and-sold</link>
    <description>
        &lt;b&gt;After facebook and google, Twitter became the latest to buy millions of Indian smartphone users in July.

&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Rohin Dharmakumar was published by &lt;a class="external-link" href="http://forbesindia.com/article/checkin/how-nextgen-smartphone-users-are-being-bought-and-sold/35859/1"&gt;Forbes India Magazine&lt;/a&gt; on August 13, 2013, and later mirrored in &lt;a class="external-link" href="http://ibnlive.in.com/news/how-nextgen-smartphone-users-are-being-bought-and-sold/415719-11.html"&gt;IBN Live&lt;/a&gt; on August 19, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Now, the actual announcement was about how Twitter had partnered with  Vodafone India to offer its services ‘free of cost’ to mobile  subscribers for three months. It had already inked similar deals with  Airtel and Reliance, according to Medianama, a digital media news site.  Google and Facebook, too, announced such agreements during the past  year, whereby mobile subscribers could use their service ‘free of cost’  through their phones.&lt;br /&gt;&lt;br /&gt;Nothing is really ‘free’ on the web, which  is why we have the adage: “If you’re not paying for it, you are the  product”. So these large web companies are actually buying millions of  first-time mobile internet users by paying off their respective mobile  operators. Of India’s 137 million internet users, roughly 120 million  access mobile internet. &lt;br /&gt;&lt;br /&gt;Sunil Abraham, director of the Centre  for Internet &amp;amp; Society in Bangalore, thinks India could be going  down the Indonesia route. “If you ask the average Indonesian mobile user  if he or she has internet access, they might say no. Ask them if they  have Facebook or Twitter, and they’ll say yes!” Incidentally, 96 percent  of Indonesians use social media, mostly from their phones. &lt;br /&gt;&lt;br /&gt;Smaller  competitors to Facebook, Google and Twitter who can’t afford to pay  mobile operators on similar terms will find their competitiveness  shrinking. Meanwhile, a large number of Indians will balk at paying for  internet usage on their phones because the social networks are all  ‘free’.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/forbesindia-august-13-2013-rohin-dharmakumar-how-nextgen-smartphone-users-are-being-bought-and-sold'&gt;https://cis-india.org/news/forbesindia-august-13-2013-rohin-dharmakumar-how-nextgen-smartphone-users-are-being-bought-and-sold&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-05T10:48:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security">
    <title>Surveillance: Privacy Vs Security </title>
    <link>https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security</link>
    <description>
        &lt;b&gt;The Foundation for Media Professionals is organizing a debate at the India International Centre, New Delhi on August 17, 2013. Shri Kapil Sibal will give the opening speech. Natgrid chief Raghu Raman is one of the debaters. Pranesh Prakash is participating in this event as a panelist.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This was &lt;a class="external-link" href="http://fmp.org.in/index.php/events"&gt;published by the Foundation for Media Professionals&lt;/a&gt; on their website. Also read the &lt;a class="external-link" href="http://fmp.org.in/index.php/events/eventDetail/51"&gt;blog post&lt;/a&gt; by Vivian Fernandes and Ninglun Hanghal.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the backdrop of the recent disclosures by US defense contractor Edward Snowden about the activity of the National Security Agency (NSA) and reports that NSA may have collaborated with India on surveillance program in the country that have raised concerns about privacy and right of citizens, Foundation for Media Professionals (FMP) in partnership with Friedrich Ebert Stiftung (FES) invited Pranesh Prakash to a panel discussion on "Surveillance: Privacy vs. Security".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Guest Speaker&lt;/b&gt;&lt;br /&gt;Kapil Sibal, Union Minister for Communications and Information Technology, Govt. of India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Panelists&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Pranesh Prakash, Policy Director, Centre for Internet and Society&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Dr. Usha Ramanathan, Independent Law Researcher&lt;/li&gt;
&lt;li&gt;Saikat Datta, Resident Editor, DNA&lt;/li&gt;
&lt;li&gt;Capt. Raghu Raman, National Intelligence Grid (Natgrid)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Moderator&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Paranjoy Guha Thakurta&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security'&gt;https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-19T05:32:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata">
    <title>FinFisher in India and the Myth of Harmless Metadata</title>
    <link>https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata</link>
    <description>
        &lt;b&gt;In this article, Maria Xynou argues that metadata is anything but harmless, especially since FinFisher — one of the world's most controversial types of spyware — uses metadata to target individuals. &lt;/b&gt;
        &lt;p align="JUSTIFY"&gt;In light of PRISM, the Central Monitoring System (CMS) and other such surveillance projects in India and around the world, the question of whether the collection of metadata is “harmless” has arisen.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; In order to examine this question, FinFisher&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; — surveillance spyware — has been chosen as a case study to briefly examine to what extent the collection and surveillance of metadata can potentially violate the right to privacy and other human rights. FinFisher has been selected as a case study not only because its servers have been recently found in India&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; but also because its “remote monitoring solutions” appear to be very pervasive even on the mere grounds of metadata.&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;FinFisher in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;FinFisher is spyware which has the ability to take control of target computers and capture even encrypted data and communications. The software is designed to evade detection by anti-virus software and has versions which work on mobile phones of all major brands.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; In many cases, the surveillance suite is installed after the target accepts installation of a fake update to commonly used software.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; Citizen Lab researchers have found three samples of FinSpy that masquerades as Firefox.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FinFisher is a line of remote intrusion and surveillance software developed by Munich-based Gamma International. FinFisher products are sold exclusively to law enforcement and intelligence agencies by the UK-based Gamma Group.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; A few months ago, it was reported that command and control servers for FinSpy backdoors, part of Gamma International´s FinFisher “remote monitoring solutions”, were found in a total of 25 countries, including India.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The following map, published by the Citizen Lab, shows the 25 countries in which FinFisher servers have been found.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Map.png" alt="Map" class="image-inline" title="Map" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;The above map shows the results of scanning for characteristics of FinFisher command and control servers&lt;/i&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="JUSTIFY"&gt;FinFisher spyware was not found in the countries coloured blue, while the colour green is used for countries not responding. The countries using FinFisher range from shades of orange to shades of red, with the lightest shade of orange ranging to the darkest shade of red on a scale of 1-6,  and with 1 representing the least active servers and 6 representing the most active servers in regards to the use of FinFisher. On a scale of 1-6, India is marked a 3 in terms of actively using FinFisher.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Research published by the Citizen Lab reveals that FinSpy servers were recently found in India, which indicates that Indian law enforcement agencies may have bought this spyware from Gamma  Group and might be using it to target individuals in India.&lt;a href="#fn11" name="fr11"&gt;[11] &lt;/a&gt;According to the Citizen Lab, FinSpy servers in India have been detected through the HostGator operator and the first digits of the IP address are: 119.18.xxx.xxx. Releasing complete IP addresses in the past has not proven useful, as the servers are quickly shut down and relocated, which is why only the first two octets of the IP address are revealed.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Citizen Lab's research reveals that FinFisher “remote monitoring solutions” were found in India, which, according to Gamma Group's brochures, include the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinSpy: &lt;/b&gt;hardware or software which monitors targets that regularly change location, use encrypted and anonymous communications channels and reside in foreign countries. FinSpy can remotely monitor computers and encrypted communications, regardless of where in the world the target is based. FinSpy is capable of bypassing 40 regularly tested antivirus systems, of monitoring the calls, chats, file transfers, videos and contact lists on Skype, of conducting live surveillance through a webcam and microphone, of silently extracting files from a hard disk, and of conducting a live remote forensics on target systems. FinSpy is hidden from the public through anonymous proxies.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinSpy Mobile:&lt;/b&gt; hardware or software which remotely monitors mobile phones. FinSpy Mobile enables the interception of mobile communications in areas without a network, and offers access to encrypted communications, as well as to data stored on the devices that is not transmitted. Some key features of FinSpy Mobile include the recording of common communications like voice calls, SMS/MMS and emails, the live surveillance through silent calls, the download of files, the country tracing of targets and the full recording of all BlackBerry Messenger communications. FinSpy Mobile is hidden from the public through anonymous proxies.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly USB: &lt;/b&gt;hardware which is inserted into a computer and which can automatically install the configured software with little or no user-interaction and does not require IT-trained agents when being used in operations. The FinFly USB can be used against multiple systems before being returned to the headquarters and its functionality can be concealed by placing regular files like music, video and office documents on the device. As the hardware is a common, non-suspicious USB device, it can also be used to infect a target system even if it is switched off.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly LAN: &lt;/b&gt;software which can deploy a remote monitoring solution on a target system in a local area network (LAN). Some of the major challenges law enforcement faces are mobile targets, as well as targets who do not open any infected files that have been sent via email to their accounts. FinFly LAN is not only able to deploy a remote monitoring solution on a target´s system in local area networks, but it is also able to infect files that are downloaded by the target, by sending fake software updates for popular software or to infect the target by injecting the payload into visited websites. Some key features of the FinFly LAN include: discovering all computer systems connected to LANs, working in both wired and wireless networks, and remotely installing monitoring solutions through websites visited by the target. FinFly LAN has been used in public hotspots, such as coffee shops, and in the hotels of targets.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly Web:&lt;/b&gt; software which can deploy remote monitoring solutions on a target system through websites. FinFly Web is designed to provide remote and covert infection of a target system by using a wide range of web-based attacks. FinFly Web provides a point-and-click interface, enabling the agent to easily create a custom infection code according to selected modules. It provides fully-customizable web modules, it can be covertly installed into every website and it can install the remote monitoring system even if only the email address is known.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly ISP:&lt;/b&gt; hardware or software which deploys a remote monitoring solution on a target system through an ISP network. FinFly ISP can be installed inside the Internet Service Provider Network, it can handle all common protocols and it can select targets based on their IP address or Radius Logon Name. Furthermore, it can hide remote monitoring solutions in downloads by targets, it can inject remote monitoring solutions as software updates and it can remotely install monitoring solutions through websites visited by the target.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Although FinFisher is supposed to be used for “lawful interception”, it has gained notoriety for targeting human rights activists.&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt; &lt;span&gt;According to &lt;/span&gt;Morgan Marquis-Boire, a security researcher and technical advisor at the Munk School and a security engineer at Google, FinSpy has been used in Ethiopia to target an opposition group called Ginbot.&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; Researchers have argued that FinFisher has been sold to Bahrain's government to target activists, and such allegations were based on an examination of malicious software which was emailed to Bahraini activists.&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; Privacy International has argued that FinFisher has been deployed in Turkmenistan, possibly to target activists and political dissidents.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Many questions revolving around the use of FinFisher and its “remote monitoring solutions” remain   vague, as there is currently inadquate proof of whether this spyware is being used to target individuals by law enforcement agencies in the countries where command and control servers have been found, such as India.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt; However, FinFisher's brochures which were circulated in the ISS world trade shows and leaked by WikiLeaks do reveal some confirmed facts: Gamma International claims that its FinFisher products are capable of taking control of target computers, of capturing encrypted data  and of evading mainstream anti-virus software.&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt; Such products are exhibited in the world's largest surveillance trade show and probably sold to law enforcement agencies around the world.&lt;a href="#fn25" name="fr25"&gt;[25] &lt;/a&gt;This alone unveils a concerning fact: spyware which is so sofisticated that it even evades encryption and anti-virus software is currently in the market and law enforcement agencies can potentially use it to target activists and anyone who does not comply with social conventions.&lt;a href="#fn26" name="fr26"&gt;[26] &lt;/a&gt;A few months ago, two Indian women were arrested after having questioned the shutdown of Mumbai for Shiv Sena patriarch Bal Thackeray's funeral.&lt;a href="#fn27" name="fr27"&gt;[27] &lt;/a&gt;Thus, it remains unclear what type of behaviour is targeted by law enforcement agencies and whether spyware, such as FinFisher, would be used in India to track individuals without a legally specified purpose.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, India lacks privacy legislation which could safeguard individuals from potential abuse, while sections 66A and 69 of the Information Technology (Amendment) Act, 2008, empower Indian authorities with extensive surveillance capabilites.&lt;a href="#fn28" name="fr28"&gt;[28] &lt;/a&gt;While it remains unclear if Indian law enforcement agencies are using FinFisher spy products to unlawfully target individuals, it is a fact that FinFisher control and command servers have been found in India and that, if used, they could potentially have severe consequences on individuals' right to privacy and other human rights.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;The Myth of Harmless Metadata&lt;/h2&gt;
&lt;p align="JUSTIFY"&gt;Over the last months, it has been reported that the Central Monitoring System (CMS) is being implemented in India, through which all telecommunications and Internet communications in the country are being centrally intercepted by Indian authorities. This mass surveillance of communications in India is enabled by the omission of privacy legislation and Indian authorities are currently capturing the metadata of communications.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Last month, Edward Snowden leaked confidential U.S documents on PRISM, the top-secret  National Security Agency (NSA) surveillance programme that collects metadata through telecommunications and Intenet communications. It has been reported that through PRISM, the NSA has tapped into the servers of nine leading Internet companies: Microsoft, Google, Yahoo, Skype, Facebook, YouTube, PalTalk, AOL and Apple.&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; While the extent to which the NSA is actually tapping into these servers remains unclear, it is certain that the NSA has collected metadata on a global level.&lt;a href="#fn32" name="fr32"&gt;[32]&lt;/a&gt; Yet, the question of whether the collection of metadata is “harmful” remains ambiguous.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;According to the National Information Standards Organization (NISO), the term “metadata” is defined as “structured information that describes, explains, locates or otherwise makes it easier to retrieve, use or manage an information resource”. NISO claims that metadata is “data about data” or “information about information”.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; Furthermore, metadata is considered valuable due to its following functions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Resource discovery&lt;/li&gt;
&lt;li&gt;Organizing electronic resources&lt;/li&gt;
&lt;li&gt;Interoperability&lt;/li&gt;
&lt;li&gt;Digital Identification&lt;/li&gt;
&lt;li&gt;Archiving and preservation&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Metadata can be used to find resources by relevant criteria, to identify resources, to bring similar resources together, to distinguish dissimilar resources and to give location information. Electronic resources can be organized through the use of various software tools which can automatically extract and reformat information for Web applications. Interoperability is promoted through metadata, as describing a resource with metadata allows it to be understood by both humans and machines, which means that data can automatically be processed more effectively. Digital identification is enabled through metadata, as most metadata schemes include standard numbers for unique identification. Moreover, metadata enables the archival and preservation of large volumes of digital data.&lt;a href="#fn34" name="fr34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Surveillance projects, such as PRISM and India's CMS, collect large volumes of metadata, which include the numbers of both parties on a call, location data, call duration, unique identifiers, the International Mobile Subscriber Identity (IMSI) number, email addresses, IP addresses and browsed webpages.&lt;a href="#fn35" name="fr35"&gt;[35]&lt;/a&gt; However, the fact that such surveillance projects may not have access to content data might potentially create a false sense of security.&lt;a href="#fn36" name="fr36"&gt;[36]&lt;/a&gt; When Microsoft released its report on data requests by law enforcement agencies around the world in March 2013, it revealed that most of the  disclosed data was metadata, while relatively very little content data was allegedly disclosed.&lt;a href="#fn37" name="fr37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;imilarily, Google's transparency report reveals that the company disclosed large volumes of metadata to law enforcement agencies, while restricting its disclosure of content data.&lt;a href="#fn38" name="fr38"&gt;[38]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Such reports may potentially provide a sense of security to the public, as they reassure that the content of  personal emails, for example, has not been shared with the government, but merely email addresses – which might be publicly available online anyway. However, is content data actually more “harmful” than metadata? Is metadata “harmless”? How much data does metadata actually reveal?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Guardian recently published an article which includes an example of how individuals can be tracked through their metadata. In particular, the example explains how an individual is tracked – despite using an anonymous email account – by logging in from various hotels' public Wi-Fi and by leaving trails of metadata that include times and locations. This example illustrates how an individual can be tracked through metadata alone, even when anonymous accounts are being used.&lt;a href="#fn39" name="fr39"&gt;[39]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Wired published an article which states that metadata can potentially be more harmful than content data because “unlike our words, metadata doesn't lie”. In particular, content data shows what an individual says – which may be true or false – whereas metadata includes what an individual does. While the validity of the content within an email may potentially be debateable, it is undeniable that an individual logged into specific websites – if that is what that individuals' IP address shows. Metadata, such as the browsing habits of an individual, may potentially provide a more thorough and accurate profile of an individual than that individuals' email content, which is why metadata can potentially be more harmful than content data.&lt;a href="#fn40" name="fr40"&gt;[40]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, voice content is hard to process and written content in an email or chat communication may not always be valid. Metadata, on the other hand, provides concrete patterns of an individuals' behaviour, interests and interactions. For example, metadata can potentially map out an individuals' political affiliation, interests, economic background, institution, location, habits and the people that individual interacts with. Such data can potentially be more valuable than content data, because while the validity of email content is debateable, metadata usually provides undeniable facts. Not only is metadata more accurate than content data, but it is also ideally suited to automated analysis by a computer. As most metadata includes numeric figures, it can easily be analysed by data mining software, whereas content data is more complicated.&lt;a href="#fn41" name="fr41"&gt;[41]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;FinFisher products, such as FinFly LAN, FinFly Web and FinFly ISP, provide solid proof that the collection of metadata can potentially be “harmful”. In particular, FinFly LAN can be deployed in a target system in a local area network (LAN) by infecting files that are downloaded by the target, by sending fake software updates for popular software or by infecting the payload into visited websites. The fact that FinFly LAN can remotely install monitoring solutions through websites visited by the target indicates that metadata alone can be used to acquire other sensitive data.&lt;a href="#fn42" name="fr42"&gt;[42]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;FinFly Web can deploy remote monitoring solutions on a target system through websites. Additionally, FinFly Web can be covertly installed into every website and it can install the remote monitoring system even if only the email address is known.&lt;a href="#fn43" name="fr43"&gt;[43]&lt;/a&gt; FinFly ISP can select targets based on their IP address or Radius Logon Name. Furthermore, FinFly ISP can remotely install monitoring solutions through websites visited by the target, as well as inject remote monitoring solutions as software updates.&lt;a href="#fn44" name="fr44"&gt;[44]&lt;/a&gt; In other words, FinFisher products, such as FinFly LAN, FinFly Web and FinFly ISP, can target individuals, take control of their computers and their data, and capture even encrypted data and communications with the help of metadata alone.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The example of FinFisher products illustrates that metadata can potentially be as “harmful” as content data, if acquired unlawfully and without individual consent.&lt;a href="#fn45" name="fr45"&gt;[45]&lt;/a&gt; Thus, surveillance schemes, such as PRISM and India's CMS, which capture metadata without individuals' consent can potentially pose a major threat to the right to privacy and other human rights.&lt;a href="#fn46" name="fr46"&gt;[46]&lt;/a&gt; Privacy can be defined as the claim of individuals, groups or institutions to determine when, how and to what extent information about them is communicated to others.&lt;a href="#fn47" name="fr47"&gt;[47]&lt;/a&gt; Furthermore, privacy is at the core of human rights because it protects individuals from abuse by those in power.&lt;a href="#fn48" name="fr48"&gt;[48]&lt;/a&gt; The unlawful collection of metadata exposes individuals to the potential violation of their human rights, as it is not transparent who has access to their data, whether it is being shared with third parties or for how long it is being retained.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;It is not clear if Indian law enforcement agencies are actually using FinFisher products, but the Citizen Lab did find FinFisher command and control servers in the country which indicates that there is a high probability that such spyware is being used.&lt;a href="#fn49" name="fr49"&gt;[49] &lt;/a&gt;This probability is highly concerning not only because the specific spy products have such advanced capabilities that they are even capable of capturing encrypted data, but also because India currently lacks privacy legislation which could safeguard individuals.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Thus, it is recommended that Indian law enforcement agencies are transparent and accountable if they are using spyware which can potentially breach their citizens' human rights and that privacy legislation is enacted into law. Lastly, it is recommended that all surveillance technologies are strictly regulated with regards to the protection of human rights and that Indian authorities adopt the principles on communication surveillance formulated by the Electronic Frontier Foundation and Privacy International.&lt;a href="#fn50" name="fr50"&gt;[50]&lt;/a&gt; The above could provide a decisive first step in ensuring that India is the democracy it claims to be.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Robert Anderson (2013), &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;a class="external-link" href="http://bit.ly/fnkGF3"&gt;http://bit.ly/fnkGF3&lt;/a&gt;&lt;a href="http://www.finfisher.com/FinFisher/en/index.php"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Michael Lewis, &lt;i&gt;“FinFisher Surveillance Spyware Spreads to Smartphones”, &lt;/i&gt;&lt;span&gt;The Star: Business, 30 August 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14sF2IQ"&gt;http://bit.ly/14sF2IQ&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Marcel Rosenbach, &lt;i&gt;“Troublesome Trojans: Firm Sought to Install Spyware Via Faked iTunes Updates”, &lt;/i&gt;&lt;span&gt;Der Spiegel, 22 November 2011, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14sETVV"&gt;http://bit.ly/14sETVV&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Intercept Review, &lt;i&gt;Mozilla to Gamma: stop disguising your FinSpy as Firefox, &lt;/i&gt;&lt;span&gt;02 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/131aakT"&gt;http://bit.ly/131aakT&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Intercept Review, &lt;i&gt;LI Companies Review (3) – Gamma, &lt;/i&gt;&lt;span&gt;05 April 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/Hof9CL"&gt;http://bit.ly/Hof9CL&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/zaknq5"&gt;http://bit.ly/zaknq5&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy Mobile: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19pPObx"&gt;http://bit.ly/19pPObx&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly USB: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cJSu4h"&gt;http://bit.ly/1cJSu4h&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly LAN: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J70Hi"&gt;http://bit.ly/14J70Hi&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly Web: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19fn9m0"&gt;http://bit.ly/19fn9m0&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly ISP: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt;http://bit.ly/13gMblF&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Gerry Smith, &lt;i&gt;“FinSpy Software Used To Surveil Activists Around The World, Reports Says”, &lt;/i&gt;&lt;span&gt;The Huffington Post, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://huff.to/YmmhXI"&gt;http://huff.to/YmmhXI&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Jeremy Kirk, &lt;i&gt;“FinFisher Spyware seen Targeting Victims in Vietnam, Ethiopia”, &lt;/i&gt;&lt;span&gt;Computerworld: IDG News, 14 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J8BwW"&gt;http://bit.ly/14J8BwW&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. Reporters without Borders: For Freedom of Information (2012), &lt;i&gt;The Enemies of the Internet: Special Edition: Surveillance, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/10FoTnq"&gt;http://bit.ly/10FoTnq&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. Privacy International, &lt;i&gt;FinFisher Report, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/QlxYL0"&gt;http://bit.ly/QlxYL0&lt;/a&gt;&lt;span&gt;&lt;a href="https://www.privacyinternational.org/finfisherreport"&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013,&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/zaknq5"&gt;http://bit.ly/zaknq5&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. Adi Robertson, &lt;i&gt;“Paranoia Thrives at the ISS World Cybersurveillance Trade Show”, &lt;/i&gt;&lt;span&gt;The Verge, 28 December 2011, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/tZvFhw"&gt;http://bit.ly/tZvFhw&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. Gerry Smith, &lt;i&gt;“FinSpy Software Used To Surveil Activists Around The World, Reports Says”, &lt;/i&gt;&lt;span&gt;The Huffington Post, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://huff.to/YmmhXI"&gt;http://huff.to/YmmhXI&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. BBC News, &lt;i&gt;“India arrests over Facebook post criticising Mumbai shutdown”, &lt;/i&gt;&lt;span&gt;19 November 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bbc.in/WoSXkA"&gt;http://bbc.in/WoSXkA&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. Indian Ministry of Law, Justice and Company Affairs, &lt;i&gt;The Information Technology (Amendment) Act, 2008, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/19pOO7t"&gt;http://bit.ly/19pOO7t&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. Phil Muncaster, &lt;i&gt;“India introduces Central Monitoring System”, &lt;/i&gt;&lt;span&gt;The Register, 08 May 2013,&lt;a class="external-link" href="http://bit.ly/ZOvxpP"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZOvxpP"&gt;http://bit.ly/ZOvxpP&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. Glenn Greenwald &amp;amp; Ewen MacAskill, &lt;i&gt;“NSA PRISM program taps in to user data of Apple, Google and others”, &lt;/i&gt;&lt;span&gt;The Guardian, 07 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1baaUGj"&gt;http://bit.ly/1baaUGj&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. BBC News, &lt;i&gt;“Google, Facebook and Microsoft seek data request transparency”, &lt;/i&gt;&lt;span&gt;12 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bbc.in/14UZCCm"&gt;http://bbc.in/14UZCCm&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. National Information Standards Organization (2004), &lt;i&gt;Understanding Metadata, &lt;/i&gt;&lt;span&gt;NISO Press, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/LCSbZ"&gt;http://bit.ly/LCSbZ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;]. The Hindu, &lt;i&gt;“In the dark about 'India's PRISM'”, &lt;/i&gt;&lt;span&gt;16 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1bJCXg3"&gt;http://bit.ly/1bJCXg3&lt;/a&gt;&lt;span&gt;&lt;a href="http://www.thehindu.com/sci-tech/technology/in-the-dark-about-indias-prism/article4817903.ece"&gt;&lt;/a&gt; ; Glenn Greenwald, &lt;/span&gt;&lt;i&gt;“NSA collecting phone records of millions of Verizon customers daily”, &lt;/i&gt;&lt;span&gt;The Guardian, 06 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/16L89yo"&gt;http://bit.ly/16L89yo&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;]. Robert Anderson, &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, 01 July 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;]. Microsoft: Corporate Citizenship, &lt;i&gt;2012 Law Enforcement Requests Report,&lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/Xs2y6D"&gt;http://bit.ly/Xs2y6D&lt;/a&gt;&lt;a href="http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/"&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;]. Google, &lt;i&gt;Transparency Report&lt;/i&gt;&lt;span&gt;, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J7hKp"&gt;http://bit.ly/14J7hKp&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr39" name="fn39"&gt;39&lt;/a&gt;]. Guardian US Interactive Team, &lt;i&gt;A Guardian Guide to your Metadata, &lt;/i&gt;&lt;span&gt;The Guardian, 12 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZJLkpy"&gt;http://bit.ly/ZJLkpy&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr40" name="fn40"&gt;40&lt;/a&gt;]. Matt Blaze, &lt;i&gt;“Phew, NSA is Just Collecting Metadata. (You Should Still Worry)”, &lt;/i&gt;&lt;span&gt;Wired, 19 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1bVyTJF"&gt;http://bit.ly/1bVyTJF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr41" name="fn41"&gt;41&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr42" name="fn42"&gt;42&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly LAN: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J70Hi"&gt;http://bit.ly/14J70Hi&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr43" name="fn43"&gt;43&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly Web: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19fn9m0"&gt;http://bit.ly/19fn9m0&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr44" name="fn44"&gt;44&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly ISP: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files,&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt;http://bit.ly/13gMblF&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr45" name="fn45"&gt;45&lt;/a&gt;]. Robert Anderson, &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, 01 July 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr46" name="fn46"&gt;46&lt;/a&gt;]. Shalini Singh, &lt;i&gt;“India's surveillance project may be as lethal as PRISM”, &lt;/i&gt;&lt;span&gt;The Hindu, 21 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/15oa05N"&gt;http://bit.ly/15oa05N&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr47" name="fn47"&gt;47&lt;/a&gt;]. Cyberspace Law and Policy Centre, &lt;i&gt;Privacy, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/14J5u7W"&gt;http://bit.ly/14J5u7W&lt;/a&gt;&lt;span&gt;&lt;a href="http://www.cyberlawcentre.org/genl0231/privacy.htm"&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr48" name="fn48"&gt;48&lt;/a&gt;]. Bruce Schneier, &lt;i&gt;“Privacy and Power”, &lt;/i&gt;&lt;span&gt;Schneier on Security, 11 March 2008, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/i2I6Ez"&gt;http://bit.ly/i2I6Ez&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr49" name="fn49"&gt;49&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr50" name="fn50"&gt;50&lt;/a&gt;]. Elonnai Hickok, &lt;i&gt;“Draft International Principles on Communications Surveillance and Human Rights”, &lt;/i&gt;&lt;span&gt;The Centre for Internet and Society, 16 January 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/XCsk9b"&gt;http://bit.ly/XCsk9b&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata'&gt;https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-13T11:30:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-august-9-2013-moulishree-srivastava-anirban-sen-chinese-hackers-baiting-indian-govt-corporate-employees">
    <title>Chinese hackers baiting Indian govt, corporate employees: report</title>
    <link>https://cis-india.org/news/livemint-august-9-2013-moulishree-srivastava-anirban-sen-chinese-hackers-baiting-indian-govt-corporate-employees</link>
    <description>
        &lt;b&gt;Hackers using fake subject headings to get users to open virus-laden email attachments.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Moulishree Srivastava and Anirban Sen was &lt;a class="external-link" href="http://www.livemint.com/Politics/NILcUWKLyogvHPit5kIrgP/Chinese-hackers-baiting-Indian-govt-corporate-employees-re.html"&gt;published in Livemint on August 9, 2013&lt;/a&gt;. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Using faked subject headings as diverse as Gujarat chief minister &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Narendra%20Modi"&gt;Narendra Modi&lt;/a&gt;&lt;/span&gt; and the Jallianwala Bagh Massacre, Chinese hackers have been baiting  Indian government officials and corporate employees to open virus-laden  emailed attachments and expose themselves to the risk of cyber attacks, a  new report says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report on “advanced persistent cyber attacks” is based on an investigation conducted by security research firm &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Research%20Bundle"&gt;Research Bundle&lt;/a&gt;&lt;/span&gt; in collaboration with CERT-ISAC. ISAC is a certification body for  information technology (IT) security professionals that handles India’s  National Security Database (NSD). CERT (Computer Emergency Response  Team)-ISAC deals with mobile and electronic security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Some time back, there were a couple of high-profile  cyber attacks that came to our notice when we were approached by  corporates as well as government entities to look into them,” said  Rajshekhar Murthy, director at CERT-ISAC, NSD, at the report’s release  on Friday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“First we thought it might be just these few incidents,  but as we went deeper into it, it came to light that these threats were  far more (widely) spread than we had initially perceived. During the  course of our research, we got proof that the threats originated from  China,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;NSD, managed by ISAC and the government, is a programme  that provides certification to IT professionals who have capability to  protect critical infrastructure and the economy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Chinese hackers have been persistent in their attacks.  According to our analysis, they have also made a separate wing for these  operations,” Murthy said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report says, “It’s also a known fact the Indian  government and other important sectors from India were heavily targeted  during this campaign...focused on stealing confidential documents and  sensitive information.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The threat came in the form of emails with attached  documents targeting government and corporate entities. “These documents  exploited previously known vulnerabilities to drop ‘Travnet’ malware on  to the systems,” said the report, prepared by 20 Internet security  professionals over a period of six months.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“These emails showed that China has been gathering  information about India and keeping up with current issues, and using  those to entice people to open the attachments,” Murthy said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the attachments had names such as Army Cyber  Security Policy 2013.doc, Jallianwala bagh massacre - a deeply shameful  act.doc, Report - Asia Defense Spending Boom.doc, His Holiness the Dalai  Lama’s visit to Switzerland day 3.doc, and BJP won’t dump Modi for  Nitish NDA headed for split.doc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The malware Travnet was specifically designed to search  for “doc, docx, xls, xlsx, txt, rtf and pdf” files on the hacked  computer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This provides enough hints that this malware was  designed to steal confidential information, unlike the usual botnet  variants that focus primarily on providing remote access to the system,”  the report said. “The malware initially collects system information, a  list of files on the victim machine among others, then sends this data  to the remote Command &amp;amp; Control server...”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to industry estimates, losses due to cyber theft from reported attacks alone amount to $8-10 billion (&lt;span&gt;&lt;span class="WebRupee"&gt;Rs.&lt;/span&gt;&lt;/span&gt;48,800-61,000 crore). But experts say the figure could be much higher as many threats go unreported.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Worryingly, the security infrastructure of Indian  government websites has reportedly failed to keep pace with cyber  attackers, who are becoming more focused on stealing information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Many of the servers that host ‘gov.in’ sites are running  outdated software versions, with poorly managed Web servers that do not  follow even the most basic Web application security guidelines,” said  the report. “Even important government sites, access to which can lead  to much deeper intrusion, seem to be managed with little care. While  defacements are usually carried out by hackers just for fun or fame,  serious hackers can cause much more damage and remain unnoticed for a  very long time...”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Slowly but steadily, serious APT (advanced, persistent  attacks) campaigns are on the rise,” the report added. “It’s very  important for the nation to start upgrading its IT infrastructure to  keep up with the latest security guidelines and practices.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Cyber security has become one of the crucial areas for  us and we are focusing on putting capacity and capability in place to  strengthen the cyber security infrastructure,” said Alok Vijayant,  director of the National Technical Research Organisation. “We want to  bring IT security professionals under one entity to enhance our existing  capability instead of just focusing on putting in additional security  infrastructure.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“India has one of the largest talent pools of IT  professionals, but our biggest concern remains the young talent in IT,  as most professionals prefer to go abroad to work,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the use of proprietary rather than  open-source software increases the vulnerability of Indian entities,  according to &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;&lt;/span&gt;, executive director of Bangalore-based research organization Centre for Internet and Society. “There’s a lack of use of &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Linux"&gt;Linux&lt;/a&gt;&lt;/span&gt; and other kinds of free software at both the desktop level and also the front end... They’re using &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Microsoft"&gt;Microsoft&lt;/a&gt;&lt;/span&gt; both at the server end and on the client end. Most of these attacks  take advantage of that operating system dependency. If one were to look  at it at a macro level, we’re vulnerable across the board—vulnerable to  the US, we’re vulnerable to attackers from Europe, Pakistan, etc.,”  Abraham said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-august-9-2013-moulishree-srivastava-anirban-sen-chinese-hackers-baiting-indian-govt-corporate-employees'&gt;https://cis-india.org/news/livemint-august-9-2013-moulishree-srivastava-anirban-sen-chinese-hackers-baiting-indian-govt-corporate-employees&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-05T10:31:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-aug-1-2013-kim-arora-facebook-limiting-access-to-social-media-can-restrict-freedom-of-speech">
    <title>Facebook: Limiting access to social media can restrict freedom of speech</title>
    <link>https://cis-india.org/news/the-times-of-india-aug-1-2013-kim-arora-facebook-limiting-access-to-social-media-can-restrict-freedom-of-speech</link>
    <description>
        &lt;b&gt;In its counter-affidavit to the PIL in the Delhi high court, Facebook has argued that limiting access to social media can limit an individual's freedom of speech and expression.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Kim Arora's article was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-08-01/social-media/40960807_1_the-pil-social-media-other-social-networking-sites"&gt;published in the Times of India&lt;/a&gt; on August 1, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The PIL, among other things, deals with the issue of minors  accessing Facebook services, arguing that under the Indian Contract Act  1872, minors can't enter into a contract. The PIL will be heard next on  Friday.&lt;/span&gt;&lt;/p&gt;
&lt;div class="mod-articletext mod-timesofindiaarticletext mod-timesofindiaarticletextwithadcpc" id="mod-a-body-after-first-para" style="text-align: justify; "&gt;
&lt;p&gt;Last year, the UN Human Rights Council had passed a &lt;a href="http://timesofindia.indiatimes.com/topic/Resolution"&gt;resolution&lt;/a&gt; declaring access to Internet as a human right. Facebook has argued  making a similar point for access to social media. "The Internet is  increasingly becoming a platform for citizens including minors to  interact and voice their opinions and, therefore, a meaningful  interpretation of the right to freedom of speech and expression would  include the freedom to access social media," the counter-affidavit says.&lt;/p&gt;
&lt;p&gt;"It can be argued that in a technologically mediated society, social  media and communication infrastructure is essential to exercise freedom  of expression," says Sunil Abraham, director, Bangalore-based Center for  Internet and Society.&lt;/p&gt;
&lt;p&gt;Cyber lawyer Pavan Duggal sees it as  "hyperbole". "The issue still remains that a minor doesn't have the  capacity to act under the Contract Act," he says. Lawyers say that if a  contract is entered into for free service in exchange of personal  information, it is a "consideration" (like cash or kind) under the  Indian Contract Act 1872. The Act says, "All agreements are contracts if  they are made by the free consent of parties competent to contract, for  a lawful consideration and with a lawful object, and are not hereby  expressly declared to be void." It then lists minors as incompetent to  contract, and says, "The agreement, if any party is minor, is void ab  initio." However, Abraham points out that "It is not an offence to enter  a void contract."&lt;/p&gt;
&lt;p&gt;To weed out fake profiles and children's  profiles, the PIL, filed by former RSS ideologue K N Govindacharya,  argues that "obligation is cast upon Facebook and other social  networking sites to verify the authenticity of each and every  subscribers (sic) which is mandatory for Mobile companies in  telecommunication sector.&lt;/p&gt;
&lt;p&gt;Mumbai-based professor of law Saurav  Datta feels this sort of authentication could have serious privacy  implications. "There is no way they can verify users without impinging  on their privacy. The goal of the PIL is wrong. We need to protect  children, not keep people out," says Datta.&lt;/p&gt;
&lt;p&gt;Abraham says that a possible way to deal with this can be on the lines of Canadian privacy law where a &lt;a href="http://timesofindia.indiatimes.com/topic/Privacy-Commissioner"&gt;privacy commissioner&lt;/a&gt; can raise such concerns with the service provider directly.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-aug-1-2013-kim-arora-facebook-limiting-access-to-social-media-can-restrict-freedom-of-speech'&gt;https://cis-india.org/news/the-times-of-india-aug-1-2013-kim-arora-facebook-limiting-access-to-social-media-can-restrict-freedom-of-speech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-08T04:07:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-august-4-2013-deepa-kurup-token-disclosures">
    <title>Token disclosures?</title>
    <link>https://cis-india.org/news/the-hindu-august-4-2013-deepa-kurup-token-disclosures</link>
    <description>
        &lt;b&gt;Snowden’s Xkeyscore expose makes a mockery of Twitter’s transparency revelations.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The article by Deepa Kurup was &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/technology/token-disclosures/article4986166.ece"&gt;published in the Hindu&lt;/a&gt; on August 4, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;This week, roughly around the same time, two  ‘revelations’ made headlines in the world of technology. The first, the  U.S. National Security Agency’s top secret web surveillance programme,  codenamed Xkeyscore, another expose from the house of Edward Snowden  &amp;amp; Co.; and second, microblogging site Twitter’s third biannual  Transparency Report for the first half of 2013.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The  former exposed a global surveillance net, cast far and wide to freely  (no formal authorisation required) access and mine emails, chats and  browsing histories of millions. The content of the latter report not  only pales in comparison but also raises fundamental questions on just  how much goes on beyond the arguably modest claims made on Twitter’s  transparency charts.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Documents published by &lt;i&gt;The Guardian &lt;/i&gt;have  the NSA claiming that the “widest-reaching” system mining intelligence  from the web had, over a month in 2012, retrieved and stored no less  than 41 billion records on its Xkeyscore servers. These mind-boggling  numbers make a mockery of Twitter’s few hundred access request  disclosures, advocates of online privacy and freedom point out. Then, it  is hardly surprising that a large chunk of global requests came from  the U.S. government: no less than 902 of the total 1,157 requests,  accounting for 78 per cent. A far second is Japan at 8 per cent followed  by the U.K.&lt;/p&gt;
&lt;h3 class="body" style="text-align: justify; "&gt;India References&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, both Twitter’s report and the NSA’s Xkeyscore document  have India references. While a map titled 'Where is Xkeyscore' in the  training manual released showing India as one of 150 sites (hosting a  total of 700 servers) indicates that India's very much on the global  surveillance radar of the United States government; the fact that the  India is a new entrant on Twitter's ‘Country Withheld Content Tool’  means that the government here is also making active interventions in  microblogging content. This is very much in line with stances the Indian  government has taken over the last year, swinging indecisively between  asking internet firms to pre-screen content and asking service providers  to take down what it finds offensive.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;India, A Bit-Player&lt;/h3&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Twitter report states that over the last six months  it has seen an increase in the number of requests received (and eventual  withholding of content) in five new countries: India, Brazil, Japan,  Netherlands and Russia. In terms of numbers, India is still very much a  bit player in the game given it falls under the ‘less than 10 category, a  list where the number of requests for user information made by the  government during this period is fewer than 10. It appears from the  report that Twitter did not honour any of these requests, indicating  that either the requests were too broad or failed to identify individual  accounts.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In the same period, Twitter received two  requests from India to remove content, one from the “government/law  enforcement agency” and the other through a court order. In all, three  tweets were removed by Twitter. No details on the nature of content  removed were available.&lt;/p&gt;
&lt;h3 class="body" style="text-align: justify; "&gt;Transparency Trends&lt;/h3&gt;
&lt;p class="body" style="text-align: justify; "&gt;A late entrant to transparency initiatives, Twitter's  bi-annual reports have been applauded by privacy activists as an  initiative that at least attempted to offer a glimpse into the otherwise  opaque medium/industry. According to 'Who Has Your Back' an initiative  by the Electronic Frontier Foundation, which tracks which corporate  helps protect your data from the government, only a third of the 18  internet majors publish Transparency Reports – in fact, Facebook,  WordPress and Tumblr all don't publish.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;This article by Deepa Kurup was published in the Hindu on August 4, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While it's  definitely good that Twitter's providing data for India, post-Edward  Snowden and his revealing PRISM leaks, netizens would question to what  extent this data is representative of the magnitude or extent of user  data tracking. Do governments like the U.S. need to approach Twitter (or  other internet service providers) at all to access detailed user  activity logs, content and metadata?&lt;/p&gt;
&lt;h3 class="body" style="text-align: justify; "&gt;Secret Orders Excluded&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Twitter makes it clear that its current report does not include "secret  orders" or FISA disclosures. In another blog related to the Transparency  Report, Jeremy Kessel, Manager, Legal Policy at Twitter Inc, writes  that since 2012, Twitter's seen an uptick in requests to withhold  content from two to seven countries. He writes that while Twitter wants  to publish “numbers of national security requests – including FISA  (Foreign Intelligence Surveillance Act) disclosures – separately from  non-secret requests.” It claims it has “insisted” that the United States  government allow for increased transparency into “secret orders”. “We  believe it’s important to be able to publish numbers of national  security requests – including FISA disclosures – separately from  non-secret requests." Unfortunately, we are still not able to include  such metrics, Twitter states.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;'Not the Whole Truth'&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the absence of these metrics, Sunil Abraham, director of Centre for  Internet and Society, feels transparency reports “may not tell us the  whole truth”. The Xkeyscore revelations then may explain why the U.S.  government has made only 902 information requests. “A rogramme like  XKeyScore potentially allows them to capture the very same data without  having to approach Twitter. This is the very same imperative behind the  CMS project in India. Governments across the world want to automate  private sector involvement in blanket surveillance measures so that it  wont serve as a check on their unbridled appetite for data”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He warns that there's a likely “race to the bottom”, given that an  unintended consequence of transparency may be that governments, rather  than being shamed into respect for free speech and privacy, would be  emboldened by the scale of surveillance and censorship in the so-called  democracies such as the US and EU members that are on top of the global  blanket surveillance game.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-august-4-2013-deepa-kurup-token-disclosures'&gt;https://cis-india.org/news/the-hindu-august-4-2013-deepa-kurup-token-disclosures&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-07T09:30:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/ethical-issues-in-open-data">
    <title>Ethical Issues in Open Data</title>
    <link>https://cis-india.org/internet-governance/blog/ethical-issues-in-open-data</link>
    <description>
        &lt;b&gt;On August 1, 2013, I took part in a web meeting, organized and hosted by Tim Davies of the World Wide Web foundation. The meeting, titled “Ethical issues in Open Data,” had an agenda focused around privacy considerations in the context of the open data movement.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The main panelists, Carly Nyst and Sam Smith from &lt;a class="external-link" href="http://https//www.privacyinternational.org/"&gt;Privacy International&lt;/a&gt;, as well as Steve Song from the &lt;a class="external-link" href="http://www.idrc.ca/EN/Pages/default.aspx"&gt;International  Development Research Centre&lt;/a&gt;, were joined by roughly a dozen other privacy and development researchers from around the globe in the hour long session.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The primary issue of the meeting was the concern over modern capabilities of cross-analytics for de-anonymizing data sets and revealing personally identifiable information (PII) in open data. Open data can constitute publicly available information such as budgets, infrastructures, and population statistics, as long as the data meets the three open data characteristics: accessibility, machine readability, and availability for re-use. “Historically,” said Tim Davies, “public registers have been protected through obscurity.” However, both the capabilities of data analysts and the definition of personal data have continued to expand in recent years. This concern thus presents a conflict between researchers who advocate governments releasing open data reports, and researchers who emphasize privacy in the developing world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Steve Song, advisor to IDRC Information &amp;amp; Networks program, spoke of the potential collateral damage that comes with publishing more and more types of information. Song addressed the imperative of the meeting in saying, “privacy needs to be a core part of open data conversation.” In his presentation, he gave a particularly interesting example of the tensions between public and private information implications. Following the infamous &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Sandy_Hook_Elementary_School_shooting"&gt;2012 school shooting in Newtown, Connecticut&lt;/a&gt;, the information on Newtown’s gun permit owning citizens (made publicly available through America’s &lt;a class="external-link" href="http://foia.state.gov/"&gt;Freedom of Information Act&lt;/a&gt;) was aggregated into an interactive map which revealed the citizens’ addresses. This obviously became problematic for the Newtown community, as the map not only singled out homes which exercised their right to bear arms but also indirectly revealed which homes were without firearm protection and thereby more vulnerable to theft and crime. The Newtown example clearly demonstrates the relationship (and conflict) between open data and privacy; it resolves to the conflict between the right to information and the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An apparent issue surrounding open data is its perceived binary nature. Many advocates either view data as being open, or not; any intermediary boundaries are only forms of governments limiting data accessibility. Therefore, a point raised by meeting attendee Raed Sharif aptly presented an open data counter-argument. Sarif noted how, inversely, privacy conceptions may form a threat to open data. He mentioned how governments could take advantage of privacy arguments to justify their refusal to publish open reports. &lt;br /&gt;&lt;br /&gt;However, Carly Nyst summarized the privacy concern and argument in her remarks near the end of the meeting. Namely, she reasoned that the open data mission is viable, if only limited to generic data, i.e., data about infrastructure, or other information that is in no way personal. Doing so will avoid obstructions of individual privacy. Until more advanced anonymization techniques can be achieved, which can overcome modern re-identification methods, publicly publishing PII may prove too risky. It was generally agreed upon during the meeting that open data is not inherently bad, and in fact its analysis and availability can be beneficial, but the threat of its misuse makes it dangerous. For the future of open data, researchers and advocates should perhaps consider more nuanced approaches to the concept in order to respect considerations for other ethical issues, such as privacy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/ethical-issues-in-open-data'&gt;https://cis-india.org/internet-governance/blog/ethical-issues-in-open-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>kovey</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-07T09:19:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/caravan-magazine-august-1-2013-rahul-m-crypto-night">
    <title>Crypto Night</title>
    <link>https://cis-india.org/news/caravan-magazine-august-1-2013-rahul-m-crypto-night</link>
    <description>
        &lt;b&gt;Challenging government snooping at an all-night cryptography party.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Rahul M was &lt;a class="external-link" href="http://caravanmagazine.in/lede/crypto-night"&gt;published in the Caravan&lt;/a&gt; on August 1, 2013. Pranesh Prakash and Bernadette Langle are quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Satyakam Goswami sat in a conference hall in the Institute of Informatics &amp;amp; Communication in Delhi University's South  Campus, furiously typing code into his laptop. He typed the string  “/var/log/tor#”, into a Linux terminal, then turned to me and said, “I  am one step away, man.” It was around midnight on a muggy July Saturday,  and Goswami had been here for six hours. He resumed typing—and cursing  under his breath in Telugu as he realised that the online instructions  he was following weren’t helping.&lt;/p&gt;
&lt;div id="stcpDiv" style="text-align: justify; "&gt;
&lt;p&gt;Around  him, the room bustled with the activity of around 25 other people, all  participants at a Cryptoparty, a cryptography event at which programmers  and non-programmers meet to share information and expertise on tools  that can help thwart government spying.&lt;/p&gt;
&lt;p&gt;Goswami was one of the organisers of the event, which was led by  Bernadette Längle, a German ‘hacktivist’ who is a member of  the Chaos  Computer Club (CCC), Europe’s largest association of hackers. Längle was  one of the organisers of the CCC’s Chaos Communication Congress in  2012, an international hackers’ meet held in Hamburg that year. While  processing participant applications for the Congress, she came across a  group that wanted to organise what they called a “Cryptoparty” at the  meet. “I thought Cryptoparty would be a bunch of guys coming together,  learning crypto and having a party,” she told me. Only at the event did  she realise that Cryptoparties are rather more political affairs, at  which participants experiment with ways of combating governmental  intrusions into privacy and freedom.&lt;/p&gt;
&lt;p&gt;After she graduated, Längle decided she wanted to travel. “I hadn’t  been to America or Asia, and I don’t think I want to enter America,” she  said. “I thought India might be a good point to start.” While she was  exploring her options, she met Goswami online. “I first met Bernadette  on an IRC channel, ‘hasgeek’, where she expressed her interest to come  to India,” Goswami said. “I suggested that she write a proposal to CIS  [the Centre for Internet and Society, in Bangalore].” Längle applied,  and was accepted to work with the organisation for six months.&lt;/p&gt;
&lt;p&gt;When Längle was teaching a one-week course on email cryptography at a  CIS event, a participant suggested to her that she organise a  Cryptoparty in the city. “I thought I was travelling anyway, and I can  make a Cryptoparty everywhere I go,” Längle said. This led to the  Bangalore Cryptoparty on 30 June, followed by the Delhi edition on 6  July. Längle then held a Cryptoparty in Dharamsala in the second week of  July, and plans to hold another in Mumbai in October. At each of these,  she gave tutorials on specific aspects of cryptography, such as the  Pretty Good Privacy (PGP) encryption and decryption program, which  Edward Snowden used to communicate with &lt;i&gt;The Guardian&lt;/i&gt;’s Glenn  Greenwald during their now-famous collaboration. Participants would then  experiment with these tools, sending emails and messages to each other  using secure channels. The Delhi edition, which saw around 70  participants, continued late into the night, with the last exhausted  stragglers shutting off their gadgets and heading home at 4 am.&lt;/p&gt;
&lt;p&gt;I met Längle again the day after the Delhi event; with her was  Pranesh Prakash, policy director at CIS, who is a commentator on issues  related to surveillance and privacy. Both agreed that the Indian  government’s Central Monitoring System programme, as well as Edward  Snowden’s recent leaks, had resulted in a greater interest in  cryptography in the country in recent months. “Without the PRISM stuff,  there wouldn’t have been so many people attending,” Längle said. “People  are concerned about that.” Prakash believes that the NSA leaks have  served as a loud wake-up call about a longstanding state of affairs.  “It’s this I-told-you-so moment for lots of people right now,” he said.  “This isn’t the first time there have been revelations about the NSA  spying beyond their authority. These revelations have been happening at  least since 2006.”&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/caravan-magazine-august-1-2013-rahul-m-crypto-night'&gt;https://cis-india.org/news/caravan-magazine-august-1-2013-rahul-m-crypto-night&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-06T06:04:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
